Sunteți pe pagina 1din 5

1

A Hybrid Routing Protocol for Unobservable


Security in Mobile Ad-hoc Networks

Vinothini.V1,Yuvaraj.R2 and Dr.P.S.K.Patra 3


1
Department of Computer Science and Engineering, Agni College of Technology, Anna University
Chennai – 603 103,Tamilnadu,India
vinothinivijayan@gmail.com

2
Research Scholar, Anna University
Chennai, Tamil Nadu, India

3
Head of the Department, Department of Computer Science and Engineering ,Agni College of Technology, Anna University

ABSTRACT
Anonymity: Anonymity is the state of being not
Security of mobile ad hoc network is crucial due to
infrastructureless network and mobility of wireless media. In identifiable within a set of subjects, the anonymity set.
this paper, we propose an Hybrid Routing Protocol for The senders, receivers, and intermediate nodes are not
Unobservable Secured (HRPUS) to offer privacy preservation identifiable within the whole network.
to all types of packets. HRPUS works with USOR Unlinkability: The linkage between any two or more
(Unobservable Secure on-demand Routing protocol)to protect item protected from outsiders. Note linkages between
against blockhole attack. In ad hoc network, when a source
searches for a route to a destination using HRPUS protocol, an
any two messages, e.g., whether they are from the same
intermediate node can reply with its cached entry. To source node, are also protected.
strengthen correctness of such routing discovery process, we Unobservability: Any meaningful packet in the
propose a method in which the intermediate node requests its routing scheme is indistinguishable from other
next hop to send a confirmation message to the source. After packets to an outside attacker. Not only is the content of
receiving both route reply and confirmation message, the the packet but also the packet header like packet type
source determines the validity of path according to its
policy. As a result, this strategy discourages malicious nodes protected from eavesdroppers. And any node involved in
from intercepting packets. Simulation results show remarkable route discovery or packet forwarding, including the
improvement in throughput with moderate increase of control source node, destination node, and any intermediate
messages. node, is not aware of the identity of other involved.
Keywords: Anonymity, privacy, protocols, security.
There are many research efforts to overcome the
vulnerability in wireless ad hoc networks such as
1. Introduction security in the routing protocol, authentication and
authorization problem, Among many problems in the
Compared to wired networks, Mobile ad-hoc networks wireless environment, we concentrate on the routing
are more vulnerable to both active and passive attacks. robustness in this paper. In many on-demand ad hoc
Wireless transmissions are easy to capture remotely and routing protocols, intermediate nodes can answer route
undetected, whilethe lack of central management and discovery request from the source if they have a route to
monitoring make network nodes susceptible to active the destination in their route caches. However, it is
attacks. Providingsecurityfor MANETs is a possible for a node to forge the route reply message so
challenging task, and many researchershave engaged in that it may accomplish its malicious attempt. From the
designing protocols for diverse security related task such above observation, it is obvious that malicious nodes can
as key management, authentication, confidentiality, etc. easily corrupt routing information, which may cause
Recently researchers have also tackled theproblem of communication failure in the network.
privacy protection in wireless networks.
In this paper, we present a method that detects such a
Privacy preserving routing properties [3]: routing misbehaviour by making a neighbour of the
2

replying node send a confirmation message to the previous hop or the next hop on a path. However, the
source. colluding insiders are not able to know identity of the
target node or other intermediate nodes on route.
According to the design of USOR, authentication and
2. Related Work key establishment is achieved by group signature, which
perfectly protects user identity from disclosure.
Consequently, unobservability is guaranteed by USOR
A. Routing in ad hoc networks by USOR under colluding insider attacks according to the
definition of unobservability.
Routing protocols for ad hoc networks are
challenging to design: wired networksprotocols are not In the Sybil attack [4], a single node presents multiple
suitable for an environment where node mobility fake identities to other nodes in the network. Sybil
andnetwork topology rapidly change; such protocols also attacks pose a great threat to decentralized systems like
have highcommunication overheadbecause they send peer-to-peer networks and geographic routing protocols.
periodic routing messages even when the network is not In USOR, the centralized key server generates group
changing. Sofar, researchers in ad hoc networking signature signing keys and ID-based keys for network
have studied the routing problem in a non- nodes. Thus, it is impossible for the adversary to obtain
adversarialnetwork setting, assuming a reasonably other valid identities except the compromised ones.
trusted environment. However, unlikenetworks using Nevertheless, the anonymity feature of USOR allows the
dedicated nodes to support basic functions like packet adversary to launch Sybil attacks which are similar to
forwarding,routing, and network management, in ad collusion attacks discussed above. As discussed in the
hoc networks, those functions are carried out byall collusion attack part, USOR is able to count such attacks
available nodes. This very difference is at the core of the effectively.Although USOR protect packets from
increased sensitivity to nodemisbehaviour in ad hoc collusion attack and Sybil attack it does not protect
networks and the current proposed routing protocols are blokhole attack. To protect against blockhole attack, we
exposedto many different types of attacks. propose a method in which the intermediate node
In MANET, most of them exploit public key requests its next hop to send a confirmation message to
cryptosystems [4] to achieve their goals. These schemes the source. After receiving both route reply and
fail to protect all content of packets from attackers,so confirmation message, the source determines the validity
that the attacker can obtain information like packet type of path according to its policy.
and sequence number etc.
3. Methodology
An unobservable secure on-demand routing protocol
[1] based on group signature and ID-based cryptosystem A. A Hybrid Routing Protocol for Unobservable
provide complete unlinkability and content Security
unobservability.For the colluding outsiders, privacy
information is perfectly protected with USOR. As the In HRPUS protocol strengthens the correctness of route
attacker is unable to distinguish a meaningful packet information sent by intermediate nodes. Also, it helps
from a dummy packet, USOR can provide complete source node filter out possibly stale route information.
protection for privacy with an appropriate traffic By intermediate nodes, we mean nodes that are on a
padding scheme. Even if the target node is surrounded path between source and destination. Our scheme
by more than one attack node, given the assumption requires only two types of additional control messages,
that no node is totally surrounded by compromised and does not entail extraneous overhead, for example,
nodes, the attacker is unable to perceive anything except operating in promiscuous mode. Our protocol is simple
some random dummy packets. If appropriate dummy and interoperable with most on-demand routing
traffic is injected into the network, the colluding protocols. And, many authentication methods can be
outsiders cannot gain any privacy information about the combined with our protocol.
network at all.
In this paper, we only describe how our protocol
For the colluding insiders, USOR still offers operates with USOR. In addition to RREQ and RREP in
unobservability as promised. Though information USOR, our scheme also uses the following control
disclosure is unavoidable for colluding insiders, and the packets: Route Confirmation Request (CREQ) and
adversary knows some keys, the information that the Route Confirmation Reply (CREP). On finding a route
colluding insiders can obtain is largely restricted by to the destination in its cache, an intermediate node
USOR. The attackers are able to know: 1) a target node sends RREP back to the source. At the same time, our
is involved in a route discovery procedure since it is protocol requires the intermediate node to send CREQ to
broadcasting a RREQ packet; 2) a target node is the its next hop node toward the destination. Then, after
3

receiving CREQ, the next hop node looks up its cache that the route in D is removed for some reason(e.g.
for a route to the destination. If it has one, it sends timeout, route failure), while C still has it. Since route
CREP to the source with its route information. Then, caches of C and D are inconsistent, the path is unlikely
the source is able to learn whether the path in RREP is to be available. Hence, it is better to use a more reliable
valid by comparing the information with CREP. On the path if F has another. In our scheme, since Fdoes not
other hand, when the destination initiates RREP, CREQ receive CREP from D, it will avoid the possibly stale
and CREP are not necessary, since the destination path.
should give correct route if it wishes to receive data
packets. Although our protocol is not a node trust rating
system, it is compatible to such notion and can be used
Let us take an example. Figure 1 shows an example of as a basis scheme to identify non-conforming nodes. For
ad hoc network. Suppose node F (Source node) wants to example, suppose C does not want to forward packets
send data packets to R (Destination node) and has from others (to save battery, etc.) and advertises worse
no route. Suppose further that intermediate node C has route than it has. This attempt can be detected when F
a route to R in its cache. To find a route, F sends RREQ. receives CREP from D. Based on this information,
B receives and broadcasts this RREQ. When C receives rating scheme can be devised.
RREQ from B, C finds it has a route to T and sends
RREP back to F through B. In addition, C also sends On the other hand, two colluding nodes can
CREQ to its next hop, say D, asking for validation of circumvent our scheme. In our previous example,
RREP. D sends CREP to F if it also knows a route to R; suppose C and D are malicious nodes and they are
otherwise, it does nothing. F believes the path claimed colluding. Even though C sends RREP with incorrect
by C only after receiving CREP from D. information, D will send CREP that supports incorrect
If F does not receive CREP from D within a pre- RREP from C, and F will think routing information
determined amount of time, it believes that the path is from C is correct. In this paper, we only consider
less reliable, and uses other route for data transmission. possibility of malicious nodes acting alone. We refer
If F receives CREP but the information from the two this protocol as Hybrid. Because, in this example
does not match, it can choose whether to use the path finding the route from F to C is done by on-demand
according to its policy. basis and from C to R is done by table driven basis.
Our protocol discourages malicious nodes that try to
advertise falsely good paths in order to hinder path 4. Simulation Result
finding procedures or intercept all data packets. For
example, even though malicious node C tries to advertise
a better path than it actually has, this attempt can be A. Simulation Environment and Parameters
precluded since CREP from D will have different
information. So our protocol can avoid blackhole attack, Network Simulator 2 (ns-2) is used for simulation. ns-
in which a malicious node advertises that it is on the 2 is originally developed by the VINT project [20], and
shortest path to any particular destination and drops all later extended for ad hoc network simulation by the
packets. MONARCH project.

In this scenarios, which are used as inputs to


simulations. Each movement scenario file determines
initial positions and subsequent movements of all nodes.
Traffic scenario files specify source-destination pairs,
and starting and ending times of each communication
session, which are determined in an independent and
random manner.Four different traffic scenarios are
generated during simulation in HRPUs. The simulation
parameters are shown in table. I
TABLE I : SIMULATION PARAMETERS
Figure.1 HRPUS Protocol
Architecture Simulation Time 500ms
In addition, our protocol ensures robustness of a Scenario Dimension 150m x 120m
path. Intermediate nodes can send RREP after finding a
route to destination. Even though cache contents are Wireless Radio Range 250m
regularly refreshed, there can be stale information and Number of Mobile nodes 26
inconsistency between nodes. In our example, suppose
that C and D both had a route to R in their caches and
4

Average Node Speed 0-10m/s packets sent through the path will not be delivered to
destination. However, HRPUS protocol does not accept
Source-Destination Pair 10 paths replied by malicious nodes since they are not
Traffic Type 512-byte CBR traffic confirmed. As a result, it maintains relatively high
delivery ratio by avoiding such less reliable routes.
Wireless Bandwidth 2Mbps
Node Pause Time 0s

In the simulation, we consider different parameters


such as the number of malicious nodes, mobility and
policy at source. We use four different numbers of
malicious nodes (0, 2, 4 and 8), and four different pause
times (10, 20, 30, and 40) for performance evaluation.

B.Simulation Result

We implement an HRPUS in NS2. All the


information regarding node is saved in trace file. The
data transmission using HRPUS is shown in figure.2. Figure.3 Delivery
Ratio

Data transmission overhead: The ratio of the number


of packets sent or forwarded to the number of received
packets at the destination. This metric reflects the
efficiency of data packet delivery.

Figure.2 Data transmission in


HRPUS

The performance of our scheme is evaluated


against USOR, using the following metrics: Figure.4 Data Transmission Overhead
Data packet delivery ratio: The percentage of data Data transmission overhead is shown in Figure 4. We
packets delivered to destination with respect to the can observe that HRPUS protocol has lower data
number of packets sent. This metric shows the transmission overhead than USOR by around 10%.
reliability of data packet delivery. Packets forwarded through incorrect path increase
transmission overhead since data packets cannot be
Figure.3 shows delivery ratio as a function of the delivered to destination despite packet forwarding. In
number of malicious nodes. Both USOR and HRPUS USOR, since source chooses the path based on RREP, it
protocol perform well in case of no malicious nodes. may use the path including malicious nodes, which
In the presence of malicious nodes, however, the cause packet loss and consequent increase in data
delivery ratio of HRPUS protocol exhibits 30% higher transmissions overhead. On the other hand, the use of
delivery ratio than USOR. In USOR, a malicious node confirmation packets in HRPUS protocol precludes
replies to RREQ pretending a neighbor to destination, paths containing malicious nodes, reducing data
and Receives source into choosing the path in RREP transmission overhead as a consequence.
as the shortest path to destination. Consequently, data
5

4. Conclusions

In this paper, we proposed an unobservable secure


hybrid routing protocol scheme that strengthens
robustness of routing information in ad hoc networks.
Simulation results validate the effectiveness of our
protocol against blackhole attack. With malicious nodes,
delivery ratio and Data Transmission of HRPUS
protocol givesbetter performancethan USOR protocol.

References
[1] Zhiguo Wan, KuiRen, and Ming Gu "An
Unobservable Secure On-Demand Routing Protocol for
Mobile Ad Hoc Networks” IEEE TRANSACTIONS ON
WIRELESS COMMUNICATIONS, VOL.11, NO. 5,
MAY 2012.

[2] “Privacy-preserving location-based on-demand


routing i n MANETs,” IEEE J. Sel. Areas
Commun., vol. 29, no. 10, pp.1926–1934, 2011

[3] A.Pfitzmann and M. Hansen, “Anonymity,


Unobservability, and pseudonymity: a consolidated
proposal for terminology,” draft, July 2000.

[4] H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman,


“Sybilguard:defending against sybil attacks via social
networks,” in Proc. 2006 SIGCOMM, pp. 267–278.

[5] S. Capkun, L. Buttyan, and J. Hubaux, “Self-organized


public-key management for mobile ad hoc networks,”
IEEE Trans. Mobile Comput.,vol. 2, no. 1, pp. 52–64,
Jan.-Mar. 2003.

[6] Sergio Marti, T.J. Giuli, Kevin Lai, and Mary


Baker,”Mitigating Routing Misbehavior in Mobile Ad
Hoc Networks”, Department of Computer
Science,Stanford University, Stanford, CA 94305 U.S.A
{smarti,giuli,laik,mgbaker}@stanford.edu

[7] I D. Boneh, X. Boyen, and H. Shacham, “Short group


signatures,” in Advances in Cryptology–Crypto’04,
Lecture Notes in Computer Science,vol. 3152, 2004, pp.
41–55.

S-ar putea să vă placă și